Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Zhejiang University(Engineering Science)》 2012-01
Add to Favorite Get Latest Update

Detecting suspicious node within one cluster in wireless sensor network using game theoretic approach

PAN Ju-long1,2,LI Shan-ping1,ZHANG Dao-yuan2(1.College of Computer Science and Technology,Zhejiang University,Hangzhou 310027,China; 2.Department of Computer Science and Technology,China Jiliang University,Hangzhou 310018,China)  
A new method using game theoretic approach with multiple detecting nodes within one cluster was proposed after clusters were formed by using low-energy adaptive clustering hierarchy(LEACH)-C router protocol in order to detect and distinguish suspicious nodes in wireless sensor network.A suspicious node in a cluster is determined as malicious or normal one by the cluster-head using majority voting principle after all its neighbor's decisions are collected.A symmetrical encryption algorithm is used to secure the neighbor's result transmission.If the suspicious node is malicious,the final detecting result will be broadcasted to all nodes within this cluster and the suspicious one will be isolated in order to decrease the risk of invasion.The energy consume of both attacker and defender in the game is considered to fit the wireless sensor network environment.Experimental results show that the multiple detecting nodes scheme is feasible and effective to use game theoretic approach in wireless sensor network,and the detection precision is promoted.
【Fund】: 国家自然科学基金资助项目(60773180)
【CateGory Index】: TP212.9;TN915.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved